Peer paper review

Review of “The Lifecycle of a Programming Language” by Jaagup Averin, a paper I chose due to the similarities, yet important differences with my own.

A miracle that rings a Bell

A big companies hold their heads up high and only collaborate to avoid someone taking over their market, a piece of the tech world does the opposite. Thankfully, the legendary Bell labs were part of the latter team.

Locked in connections

In an age of computers, the smallest signals are being used to affect input. Computers can be controlled in the most elaborate ways, and are also used to make this control possible. A key field of application? Neuroscience.

Beating the hacker

Book review of “Defeating the Hacker: A non-technical guide to computer security by Robert Schifreen.

Language wars and elitism in programming

For many, the purpose of the language is secondary and what matters is the reputation of the language itself. However others see those differences as features separating “worthy” languages from “unworthy” ones.

Scary big bro

In the world of Linux, it’s easy to get lost in the middle of all the different distributions or “flavours”. However, there are two which make up an interesting part of the community: Arch and Manjaro.

ideal Ideals

Hackers, be it white hats or black hats seem to have some common principles under which they operate. How much of them are followed in practice are however an other story.

From digital to physical

Internet censorship is a tool for propaganda at immense scale. Governments use it to restrict and shape what the users can see. Others not seek to control as much as they seek to see themselves, and privacy is a concept foreign to them.